PLE W3

 

Answer each these questions 2-3 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

 

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

500 Words Minimum Assignment

In this assignment, you are going to visit the Google Web Analytics Demo site. Please follow these steps:

  1. Be sure to have a Google email account this makes it much easier. Create free Google email account here. ( https://accounts.google.com/signup/v2/webcreateaccount?service=mail&continue=https%3A%2F%2Fmail.google.com%2Fmail%2F%3Fpc%3Dtopnav-about-en&flowName=GlifWebSignIn&flowEntry=SignUp )
  2. Go to the link below and read the simple instructions to access the Google Analytics Demo site at this link. You will see the link named “ACCESS DEMO ACCOUNT”      (https://support.google.com/analytics/answer/6367342?hl=en )
  3. Review the document above and go to the demo account “ACCESS DEMO ACCOUNT”:
  4. You will be asked for your Google email account information to access the demo.
  5. Once in the Google Analytics Demo, review the many areas and explore, check out the blue boxes when you first enter, they will be helpful. Now explore the many data metrics.
  6. Create a summary Word Document of your experience in the setup, how easy or hard was it to you. Take at least three (3) screenshots of the Google Analytics pages to attach to the summary.

Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers.

Assignment

 

  1. Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic OperationsOperations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!
    Screen shot 1: Arithmetic Operations

    • assign a value of 144 to x
    • assign a value of 6 to y
    • add x and y
    • subtract y from x
    • multiply x times y
    • divide x by y
    • find the square root of x
    • Screen shot 2: Operations on vectors
    • create a vector (afc) and assign values 2,6,3
    • create a vector (nfc) and assign values 6,4,2
    • add afc and nfc
    • Screen shot 3:  Recycle Rule for adding and subtracting vectors
    • assign values 2,1,8,3 to vector x
    • assign values 9,4 to vector y
    • add x to y
    • notice the warning message – use the Recycle Rule for adding vectors; then 
    • add x to y and show results
    • subtract 1 from x – apply the Recycle Rule for subtracting vectors; then
    • subtract y from x and show results
    • Screen shot 4: Create an S3 Class Object
    • create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.
    • name the class as “graduate student” 
    • Save the screen shots as a MS Word document (*.docx). Then, click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename).

Ethics, Law and Cybersecurity

  

Instructions:  There are four (4) topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 2) shown in your course syllabus.  You must respond to #2 and select any other two of these topic areas providing appropriate responses in essay form.  In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text.  Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

Question no 2 Mandatory

Choose any 2 from question 1,3,5.

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first three (3) questions with answers will be graded.   Include your name in the document filename. Your completed quiz must be uploaded into the appropriate eCollege Dropbox, no later than 11:59pm on the due date.  Do well.

1. How do religion, law, and philosophy each provide different grounds for justifying a moral principle?  How can each perspective be applied in analyzing the moral principle “Stealing is wrong”?  Be sure to elaborate and provide your “theoretical” rationale in support of your position. (knowledge)

2. You have just been appointed to the board of directors of TAMU.com, however, the dot.com company has been experiencing some difficult financial times that have resulted in revenue losses in three of the last four quarters.  As you take your new position, you discover that two proposals are on the table.  Each proposal has been put forth as a means for dealing with TAMU’s immediate financial problems.  Proposal #1 recommends all employees be retained, but that an immediate wage freeze for all employees be imposed for the next six months.  (Employees may even be asked to take a 5 percent cut in pay if things do not improve by the end of that period.)  Proposal #2 recommends that wages not be frozen, but that 5 percent of the company’s workforce be laid off.  (One piece of reasoning behind this proposal is that taking more drastic measures will “protect” 95 percent of TAMU’s workers and will send a message to Wall Street and local investors that TAMU is serious about improving its financial position and that it will soon be a stable company once again.) The board is evenly split, seven members for proposal #1 and seven for proposal #2.  Yours will be the tie-breaking vote.  In your deliberation, describe how an act utilitarian, a rule utilitarian, a rule deontologist, and act deontologist would reach each solution to this dilemma and on what basis.  Which solution seems most plausible? Be sure to elaborate and provide your “theoretical” rationale in support of your position. (comprehension)

3.  Do you feel that any of the four traditional ethical theories examined in chapter two are adequate to handle moral issues that arise as a result of cybertechnology?  Is a brand new ethical theory needed, as some have argued, for the Internet age; or can a comprehensive, integrated theory, such as the one proposed by James Moor (i.e., his theory of “just consequentialism”) be used successfully to resolve moral issues involving cybertechnology?  Explain your answer. Be sure to elaborate and provide your “theoretical” rationale in support of your position. (comprehension)

4. Consider a case in which the United States government, with the approval of the majority of Americans, decides to round up all Arab-Americans and relocate them into internment camps.  Imagine that you have a friend who is an American citizen of Arab descent.  She asks you to protect her from the authorities.  You have known this person all of your life, and you are convinced that she is a loyal American.  You agree to hide her in the third floor of your house.  A United States federal agent knocks on your door and asks if you know the whereabouts of the person you are hiding.  How would you respond to that agent?  You now face a genuine moral dilemma because you cannot both keep your promise to your friend and tell the truth to the federal agent.  Initially, your gut reaction might suggest that the solution to your dilemma is really quite simple.  For example, you might believe that a far greater good will be served by lying to the federal agent than by breaking your promise to your friend.  However, to embrace the moral principle inherent in that line of reasoning is to fall back into utilitarianism.  We have already seen some of the difficulties that can result from trying to be a consistent and thoroughgoing utilitarian.  Could you consistently universalize a moral principle that states:  “Whenever you must choose between telling the truth to authorities and breaking a promise to a friend, always honor your promise”?  Will that principle work in every case?  Will Ross’s theory help in this situation?  Explain your answer. Be sure to elaborate and provide your “theoretical” rationale in support of your position. (comprehension)

Grading Rubric for Quizzes

Grading criterion                                                                                          Unit Points           Total Points

Uploaded to correct Dropbox                                                                            2                            2

Submitted on time                                                                                            15                          15

Document Filename:

Your Last Name,first and middle initial with correct quiz number                   5                            5

(Example only: Creider_RD_q1)

Rationally expressed opinions, experiences (personal or observed),                  8

arguments and premises (where appropriate) to support responses

(did not simply restate/summarize author/textbook

Clearly presented classical ethics theories relative to topic                                8

Included ‘URL’ for appropriate verifiable current event                                 12                          28

(i.e., example of topic being discussed WITH EXPLANATION)

NOTE: Must be less than 4 years old

Grammatically correct and appropriate tone                                10

(professional, non offensive language)

Typographically correct                                                               10                     20

        

Included full citations as needed                                                    3

Used correct APA format                                                               7                     10

Addressed each item within selected topic area                           20                     20

        

Maximum grade                                                                         100                   100

NOTE: POINTS WILL BE DEDUCTED FROM TOTAL ASSIGNMENT GRADE IF EACH QUESTION YOU SELECTED IS NOT INCLUDED IMMEDIATELY BEFORE EACH ANSWER.

Demonstrate Your Knowledge of SQL

I need help getting answers for SQL in the PDF file attached. It appears someone posted this assignment already on Homework Market, but I was not able to get the answers. Please help. i need by next Monday September 7, 2020. 

Twitter Data Analysis

 

 

NF 160 Introduction to Data Science

Twitter Data Analysis

Due Date: Nov 5, 2020

Points: 22

Objective:

Examine students’ ability to create Twitter applications in order to download tweets by using the R platform for data science projects.

Tasks:

Students will create a Twitter application for scraping tweets by using the R platform. They will use this application to download a total of 200 tweets by searching with their chosen hashtag and from a user profile. The first 100 tweets will be collected by using a student-chosen hashtag/keyword and the rest 100 tweets will be collected from a student-chosen Twitter user profile.

Deliverables:

Two files:

  • One word processing/PDF file explaining the steps of Twitter application creation
  • The RStudio file that contains codes for Twitter data collection 

Submission:

Upload both of these files in Canvas Assignment section.

Points and Rubrics:

Word Processing/PDF file:

  • The word processing/PDF file explaining the steps of Twitter application creation will get a maximum of 5 points
  • Inclusion of comprehensive application creation steps will get a maximum of 5 points
  • Inclusion of minimal application creation steps will get a maximum of 3 points
  • No explanation of Twitter application creation will get 0 point

RStudio File:

  • The RStudio file will get a maximum of 6 points
  • 150-199 tweets comprising of a hashtag and user profile will get 5 points
  • 50-149 tweets comprising of a hashtag and use profile will get 3 points
  • Less than 50 tweets comprising of a hashtag and user profile will get 2 points
  • No tweet will get 0 points

Auditting

Analyze audit procedures for determining compliance with physical access policies for your organization or an organization with which you are familiar.

In 175 words or more discuss how you can internally audit procedures for determining compliance with physical access policies. Why is it important to maintain compliance with physical access policies? Share how you, as an IT manager, would expect to respond if an external auditor found evidence that your organization is out of compliance with its own physical access policies?